Avira AntiVir File Handling Vulnerabilities

Critical Nessus Plugin ID 25348


The remote Windows host contains an application that is affected by multiple issues.


The remote host is running Avira AntiVir, an antivirus software application.

The version of AntiVir installed on the remote host is reportedly prone to a buffer overflow in its LZH file processing code as well as denial of service vulnerabilities when parsing UPX and TAR files. An attacker may be able to exploit these issues to execute arbitrary code on the remote host, likely with LOCAL SYSTEM privileges, to crash the remote antivirus engine, or to cause the CPU to enter an endless loop.


Use AntiVir's Update feature to upgrade to the latest version.

See Also





Plugin Details

Severity: Critical

ID: 25348

File Name: avira_file_vulns.nasl

Version: $Revision: 1.17 $

Type: local

Agent: windows

Family: Windows

Published: 2007/05/31

Modified: 2016/10/07

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2007/05/23

Vulnerability Publication Date: 2007/05/28

Reference Information

CVE: CVE-2007-2972, CVE-2007-2973, CVE-2007-2974

BID: 24187, 24239

OSVDB: 36710, 36711, 36712